Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.135.63.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.135.63.138.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122801 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 04:54:18 CST 2021
;; MSG SIZE  rcvd: 107
Host info
138.63.135.106.in-addr.arpa domain name pointer KD106135063138.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.63.135.106.in-addr.arpa	name = KD106135063138.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.147.251.102 attackbots
Automatic report - Port Scan Attack
2020-04-16 13:14:14
164.132.225.229 attack
Apr 16 05:55:33 plex sshd[10578]: Invalid user fastdfs from 164.132.225.229 port 36010
2020-04-16 12:55:57
165.227.77.120 attackspam
Apr 16 00:22:13 lanister sshd[4408]: Invalid user test from 165.227.77.120
Apr 16 00:22:13 lanister sshd[4408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.77.120
Apr 16 00:22:13 lanister sshd[4408]: Invalid user test from 165.227.77.120
Apr 16 00:22:15 lanister sshd[4408]: Failed password for invalid user test from 165.227.77.120 port 33849 ssh2
2020-04-16 12:50:12
62.168.57.109 attackspambots
Apr 16 05:48:17 mail.srvfarm.net postfix/smtpd[2665726]: NOQUEUE: reject: RCPT from unknown[62.168.57.109]: 554 5.7.1 Service unavailable; Client host [62.168.57.109] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.168.57.109; from= to= proto=ESMTP helo=
Apr 16 05:48:18 mail.srvfarm.net postfix/smtpd[2665726]: NOQUEUE: reject: RCPT from unknown[62.168.57.109]: 554 5.7.1 Service unavailable; Client host [62.168.57.109] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.168.57.109; from= to= proto=ESMTP helo=
Apr 16 05:48:19 mail.srvfarm.net postfix/smtpd[2665726]: NOQUEUE: reject: RCPT from unknown[62.168.57.109]: 554 5.7.1 Service unavailable; Client host [62.168.57.109] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.168.57.109; from=
2020-04-16 12:44:36
185.113.141.102 attackbots
(sshd) Failed SSH login from 185.113.141.102 (PT/Portugal/-): 5 in the last 3600 secs
2020-04-16 13:10:46
51.255.173.70 attack
Apr 16 06:37:36 localhost sshd\[10673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.173.70  user=root
Apr 16 06:37:38 localhost sshd\[10673\]: Failed password for root from 51.255.173.70 port 44460 ssh2
Apr 16 06:41:10 localhost sshd\[10927\]: Invalid user bkpuser from 51.255.173.70
Apr 16 06:41:10 localhost sshd\[10927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.173.70
Apr 16 06:41:12 localhost sshd\[10927\]: Failed password for invalid user bkpuser from 51.255.173.70 port 51160 ssh2
...
2020-04-16 12:46:52
189.252.111.235 attackbots
*Port Scan* detected from 189.252.111.235 (MX/Mexico/Mexico City/Mexico City (Manantial Peña Pobre)/dsl-189-252-111-235-dyn.prod-infinitum.com.mx). 4 hits in the last 251 seconds
2020-04-16 13:16:25
206.72.196.219 attack
Port 22 Scan, PTR: None
2020-04-16 13:20:05
157.245.168.11 attack
*Port Scan* detected from 157.245.168.11 (US/United States/California/Santa Clara/stage.breakingaway.com). 4 hits in the last 290 seconds
2020-04-16 13:20:43
130.185.108.131 attack
SpamScore above: 10.0
2020-04-16 13:09:15
49.49.146.110 attackspam
Unauthorized connection attempt detected from IP address 49.49.146.110 to port 445
2020-04-16 12:52:03
78.128.113.75 attack
Apr 16 06:30:36 web01.agentur-b-2.de postfix/smtps/smtpd[472760]: lost connection after CONNECT from unknown[78.128.113.75]
Apr 16 06:30:55 web01.agentur-b-2.de postfix/smtps/smtpd[472787]: lost connection after CONNECT from unknown[78.128.113.75]
Apr 16 06:31:00 web01.agentur-b-2.de postfix/smtps/smtpd[472760]: lost connection after CONNECT from unknown[78.128.113.75]
Apr 16 06:31:00 web01.agentur-b-2.de postfix/smtps/smtpd[472792]: lost connection after CONNECT from unknown[78.128.113.75]
Apr 16 06:31:02 web01.agentur-b-2.de postfix/smtps/smtpd[472787]: lost connection after CONNECT from unknown[78.128.113.75]
2020-04-16 12:43:12
140.143.189.177 attackspam
Invalid user abm from 140.143.189.177 port 52966
2020-04-16 13:03:44
104.199.80.9 attackspambots
Fail2Ban Ban Triggered
2020-04-16 12:47:35
218.86.94.21 attackbotsspam
400 BAD REQUEST
2020-04-16 13:16:05

Recently Reported IPs

103.2.236.179 140.242.202.228 22.40.229.108 0.128.198.118
111.170.203.16 134.87.66.27 210.183.194.41 188.163.154.96
165.12.60.188 198.154.102.0 203.8.79.154 157.136.238.58
173.134.27.34 24.115.99.101 68.228.132.158 6.211.16.206
91.162.20.79 37.165.25.108 233.153.24.129 225.197.60.23